protecting trade secrets in the era of cyberbreach

FEBRUARY 20, 2015
ONLINE
Protecting Trade
Secrets in the Era
of Cyberbreach
To balance the benefits and costs of
data security, ask “What is reasonable
protection for sensitive commercial data?
Matthew Prewitt, Law Technology News
A succession of high profile, large scale data breaches have
made cybersecurity a pressing concern for senior corporate
leadership. The headlines in the popular press have focused on
the risks that data breaches pose to ordinary consumers: identity
theft, financial fraud, and loss of personal privacy. Data security
is at least equally important, however, to protect a company’s own
confidential commercial information and trade secrets, and the
sensitive information that commercial partners and others entrust
to the company’s safekeeping. The theft of such highly valuable
commercial information can cause losses exceeding even the
largest consumer data breaches.
Data security, however, can carry substantial costs for business.
Apart from the direct investment in hardware and software and
qualified IT security professionals, enhanced security can carry
significant hidden costs by unintentionally impeding employee
efficiency, mobility, collaboration and creativity. To balance the
benefits and costs of data security, companies must ask “What is
reasonable protection for sensitive commercial data?” That was the
question posed to a panel at American Lawyer Media’s Seventh Annual
IP Trademark, Copyright & Licensing Counsel Forum in New York.
The panel, titled “Reasonable Efforts to Protect Trade Secrets in
the Era of Cyberbreach,” and moderated by Schiff Hardin partner
Matthew Prewitt, featured Kevin Cranman, general counsel at
Ericsson Television Inc.; Michael Tucker, chief patent counsel at
BorgWarner; and Phil Weis, director and senior employment counsel
at Boehringer Ingelheim. They discussed the evolving standards for
protecting confidential business information and building company
cultures that respect and understand data security.
Prewitt: Under the law of trade secrets, the security measures a
company provides for its sensitive information define the limits of
the company’s legal rights. Security policies and practices are not
protections against theft—they are legal signposts that say, “This is
the company’s property. It belongs to us.”
This topic is timely because technology is changing accepted
notions of reasonable security. E.I. duPont deNemours & Company
v. Rolfe Christopher, 431 F.2d 1012 (5th Cir. 1970), illustrates how
something as simple as a hobbyist’s toy can upend established
precedent. In that case, someone hired a pilot to fly near and
photograph an E.I. duPont deNemours & Company Inc. factory
under construction. DuPont, of course, saw this plane circling
overhead. They ran into court, won an injunction, and then ended up
before the 5th U.S. Circuit Court of Appeals. Had DuPont abandoned
its trade secret by not putting some type of cover over the factory
while it was under construction? The Fifth Circuit answered, “No,”
offering an explanation that resonates in this era of cyberbreach:
Perhaps ordinary fences and roofs must be built, but we need
not require the discoverer of a trade secret to guard against the
unanticipated, the undetectable, or the unpreventable methods of
espionage now available.
In 2014 an ordinary consumer can now purchase in a hobby
shop an inexpensive aerial drone equipped with a camera, capable
taking the same type of photographs at issue in the case, and so
small as to escape notice from the ground. Does this change the
result in DuPont v. Christopher?
Of course, the challenges for electronic data security are far
more difficult than this relatively simple illustration. What does
it mean, in 2014, to think about methods of incursion into the
company’s computer systems that, using the language of the Fifth
Circuit, are “unanticipated, undetectable, or unpreventable”?
What is the role of in-house counsel in trying to balance, on the
one hand, maintaining security and controls over the data, but on
the other hand, maintaining an appropriate corporate environment
where people can actually work together and make money?
FEBRUARY 20, 2015
ONLINE
Weis: In-house counsel’s job is to try to strike a balance between
two competing voices: those who wish to get work done freely
without restrictions and those who know that down the line, if the
company is going to have a chance of winning in court to protect its
trade secrets or enforce a confidentiality agreement, the company
must ensure that our truly secret data has been identified and
protected as such.
Cranman: An important part of in-house counsel’s job is to
solve problems, including how to guide the company in protecting
information and facilitating a structure in which employees can
achieve the company’s goals while protecting information.
Employees need to have a structure in place that they understand and
can actually comply with in their daily work. Even well intentioned
employees may test the limits of company policies if the policies
impede the work goals. We also have to assess the sophistication of
the company’s employees. Is this a high tech company where people
are going to understand nondisclosure agreements and trade secret
terminology? Or does in-house counsel need to begin at a more
basic level? One reason nondisclosure agreements are important
is because they help to educate and to sensitize employees to the
importance of data security.
Tucker: Despite changes in technology, the starting point for
protecting trade secrets is still getting a written nondisclosure
agreement in place. Part of the problem with NDAs, however, is the
temptation to draft very broad and vague definitions of what is protected
by the agreement. Unlike a patent, which discloses an invention in
detail, with very careful drafting and extensive third-party review by
the patent examiner, there is a real risk that a confidentiality agreement
will fail to provide sufficient notice of what specific information is truly
sensitive and requires the greatest protection.
Prewitt: In order to have collaboration and exchange
of information and also maintain security, most companies
should implement tiered levels of security. How do you deal
with the challenge of achieving meaningful, escalating security
classifications?
Cranman: A trade secret audit can help. It requires time and
effort, but the audit will help the company identify what needs to
be protected, prioritize levels of security, and educate employees.
I also recommend identifying a specific person within the
organization who is charged with overseeing security for trade
secrets and other sensitive information. Of course, who that
person should be will vary with the size of the company and the
complexity of its trade secrets, but there needs to be someone
making sure that information security does not fall between the
cracks. I will add that NDAs do add value. Earlier today, a colleague
on another panel questioned, perhaps with some humor, the value
of NDAs. While enforceability differs based on the law of the
jurisdiction and the facts of the case, I firmly believe that having
NDAs is an important step in the company creating a culture of
compliance for information protection by, for example, letting
employees, suppliers, and customers know that information
protection is important and having a tangible framework in the
NDA to help focus and remind people of the obligations.
Weis: Train your employees, and keep a record of the fact that
they were trained. Set up very simple categories that any employee
can understand, and save the last category for the most highly
protected stuff. When data security becomes an issue in litigation,
your weakest link is that deponent who you haven’t imagined is ever
going to be deposed, who will say, “Yeah, I think I took the training
one time years ago when I first got here. We just stamp every single
file ‘Confidential.’”
Prewitt: At some point, in order to monetize the trade secret
or to simply have the business work, the company has to share the
information with a vendor or customer or some other commercial
partner. What should the company be looking for when its trade
secrets are outbound, when the company is the disclosing party
under the nondisclosure agreement?
Cranman: You should consider including in the NDA some sort
of rules for identifying protected information and who can receive it.
If the information is disclosed as a written document, for example, it
should be marked as confidential. Restrictions that limit disclosure
to a specific set of employees are also appropriate in some cases.
We sometimes do NDAs that say, “These three people from our
company will be able to have access to this information, and these
three from the other company will have access to it.”
Tucker: The NDA should reflect reality. If only one party is
disclosing confidential information, then the agreement should
reflect that and should not be drafted as a mutual NDA. We sometimes
insist that a supplier commit to provide our company only public
information because we do not want the risk of being subject to
unexpected restrictions under a vaguely drafted mutual NDA.
Prewitt: How do you limit the company’s risk under an NDA
when it is the receiving party to whom trade secrets are disclosed?
Tucker: In that case, a key battle becomes how long are we as
the receiving party obligated to protect the trade secrets? Many
agreements provide that the obligation continues until the trade
secret is no longer a trade secret. I try to avoid that vague and openended standard. Is there a way to identify when protection for this
information can expire based on when the product is coming to
market, or some other anticipated public disclosure?
Prewitt: Sometimes attorneys are entrusted with vast amounts
of highly sensitive information. Any tips on how to make sure that
the company’s outside counsel doesn’t become the weak link in
data security?
Cranman: As is often the case, communication is pretty
important. The law firm needs to know that data security is important
to you as a client and that data security is part of your criteria for
selecting outside counsel. Data security requires a commitment from
the entire law firm to be effective, so in house counsel needs to be
vocal about this issue to make sure it has the attention of the law firm’s
management. Law firms should realize that data security can be a way
to develop and strengthen relationships and build client trust.
Weis: And of course the opposite is true, too. You don’t want to
be the law firm that has to send the client a letter advising of a data
breach. That is very quick way to lose a client.
Matthew Prewitt, partner at Schiff Hardin; Kevin Cranman,
general counsel at Ericsson Television Inc.; Michael Tucker, chief patent
counsel at BorgWarner; and Phil Weis, director and senior employment
counsel at Boehringer Ingelheim all contributed to this piece.
Reprinted with permission from the February 20, 2015 edition of Law
Technology News. © 2015 ALM Media Properties, LLC. All rights reserved.
Further duplication without permission is prohibited. For information,
contact 877-257-3382 or reprints@alm.com. #010-02-15-04